all InfoSec news
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)
March 20, 2023, 5:12 a.m. | Hashar Mujahid
InfoSec Write-ups - Medium infosecwriteups.com
Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 2 of the comprehensive exploitation of JSON web tokens. I recommend you to read the first part of this series as well.
BANNERJWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)
Today we will learn a few more techniques to exploit the JWTs.
JWT header parameter injections.
Jwt Header can also include some parameters like jku, jwk, and kid This mostly …
cybersecurity exploitation hacking json jwt jwt token penetration testing tokens web
More from infosecwriteups.com / InfoSec Write-ups - Medium
4 Ways Cybercrime Could Impact Your Loan Business
1 week, 3 days ago |
infosecwriteups.com
Story of Lock up users’ account by DOS attack cost $1,100
1 week, 6 days ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Lead Security Analyst
@ OpenText | Virtual, CA
Cybersecurity Research Engineer
@ Peraton | Silver Spring, MD, United States
Enterprise Security Engineer
@ Salesforce | California - San Francisco